Results 41 to 50 of about 922,831 (255)

Persuasiveness of inclusive language in organizational communication

open access: yesRes Rhetorica
The study hypothesized that employees better receive messages containing inclusive forms. A review of the existing literature on inclusive language and its impact on employee well-being and organizational innovation was conducted.
Jacek Wasilewski, Agata Kostrzewa
doaj   +1 more source

Defense against Insider Threat: a Framework for Gathering Goal-based Requirements [PDF]

open access: yes, 2006
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

Layered Security Guidance for Data Asset Management in Additive Manufacturing [PDF]

open access: yesarXiv, 2023
Manufacturing industries are increasingly adopting additive manufacturing (AM) technologies to produce functional parts in critical systems. However, the inherent complexity of both AM designs and AM processes render them attractive targets for cyber-attacks.
arxiv  

Fractographic Analysis and Fatigue Behavior of Additively Manufactured Ni‐Superalloy Components with Post Processing Heat Treatment and Hot Isostatic Pressing

open access: yesAdvanced Engineering Materials, EarlyView.
A study of mechanical properties and fractography of PBF‐LB/M‐built Inconel 718, performing heat treatments and hot‐isostatic pressing, is presented. Ultimate tensile strength and fatigue behavior are evaluated, examining differences in maximum load behavior, elongation, and regimes of fatigue.
David Sommer   +3 more
wiley   +1 more source

Buffer or Enabler? The Effect of Financial Slack on R&D Investment in Different Environments

open access: yesSystems
Prior studies have shown mixed findings on the role of financial slack. This study examines how environmental factors such as munificence, dynamism, and complexity moderate the relationship between financial slack and innovation activity. Using data from
Hye Kyung Yu, Minji Kim, Tohyun Kim
doaj   +1 more source

How does intellectual capital align with cyber security? [PDF]

open access: yes, 2019
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen   +2 more
core   +2 more sources

Scalable Manufacturing of Radiation‐Tolerant Potentiometric Electrodes: A Systematic Transition from Laboratory to Semiautomated Fabrication

open access: yesAdvanced Engineering Materials, EarlyView.
Laboratory protocols for producing thin‐film pH electrodes for sterilized single‐use technologies have been successfully developed into a semiautomated workflow, with higher throughput and precision of membrane thickness. Accuracies are within 0.05 pH units versus ground truth, and uncertainty analysis reveals the largest sources of error to be derived
Bingyuan Zhao   +4 more
wiley   +1 more source

Computer Vision-Based Risk Assessment on Heterogeneous Mobile Network Operating Environments

open access: yesTehnički Vjesnik
In order to logically prioritize the urgent risks in the heterogeneous mobile network operating environment, we derive environmental factors that can reflect the characteristics of the heterogeneous network operating environment and present them as an ...
Youngjun Kim, Namkyun Baik
doaj   +1 more source

Ultra‐Fast Non‐Volatile Resistive Switching Devices with Over 512 Distinct and Stable Levels for Memory and Neuromorphic Computing

open access: yesAdvanced Functional Materials, EarlyView.
A materials and device design concept that comprises a self‐assembled ultra‐thin epitaxial ion‐transporting layer, an amorphous oxide overcoat oxygen‐blocking layer, and a partial filament formed during an electroforming step is proposed for low‐current multilevel resistive switching devices.
Ming Xiao   +17 more
wiley   +1 more source

Enhancing Industrial Cybersecurity: Insights From Analyzing Threat Groups and Strategies in Operational Technology Environments

open access: yesIEEE Open Journal of the Industrial Electronics Society
In recent years, concepts and components of information technology (IT) have made their way into the shop floor, today better known as operational technology (OT).
Mukund Bhole   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy